Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
1459aa8a18b29a31a8594e610834d51b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1459aa8a18b29a31a8594e610834d51b_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1459aa8a18b29a31a8594e610834d51b_JaffaCakes118.html
-
Size
13KB
-
MD5
1459aa8a18b29a31a8594e610834d51b
-
SHA1
557e42484815efe1d607a3ab74a5ff4490b6e79a
-
SHA256
983f7064fe76733a970569c627de1dbb704a16c90f630c94bd603d37cab706a3
-
SHA512
846c238d650ed1bef9352fdab0f6d5ba0b7f3f8d1d433b03be0576b52f420dea963cb8eff18579f082baefd73a95a32764f3b5e958a22f04f671e6e065a2fe12
-
SSDEEP
192:Cyid8cy/iZZRdjrms0JvXGwQFCVCf78xy1wSFaM82VIRwIP2R5utbSYP:CyiO/ivA9QFAi7sy1wSFaM822RPEutbr
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000a341e1beead63d1c8ed1235bf3347ef12b7e3f69bae2e793407722759f65186d000000000e80000000020000200000002140196f89e57bda26fdfc109dd4cc37b679c49b5efbe43a9b5a2efd0adfe1bf200000007329c3ef60c427cbdced6f0802773447df3523bd3653ea69cff1ebce85d68e3240000000221337c88be9d206baf0aa3885bb51976b1199aa5199db2de185cdfd6f0094493e8dbc7069a3e25451ae608bc373cb79dc3342d88a2741d7592b725cf607e243 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AACC2191-0A54-11EF-ACCC-D20227E6D795} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421016293" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0a75680619eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2580 2208 iexplore.exe 28 PID 2208 wrote to memory of 2580 2208 iexplore.exe 28 PID 2208 wrote to memory of 2580 2208 iexplore.exe 28 PID 2208 wrote to memory of 2580 2208 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1459aa8a18b29a31a8594e610834d51b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573f71b1c450b0d38a9c275d784e3b5ea
SHA1ce8c4d84ae42f9731a407b0dbe0b56a53034e1ac
SHA256d266c78d3b4e7480c755a2465cfc62a39619ffcedcb235ffc57597a574bf3b16
SHA51221ec0794237642a783f4593914d6aa84b635e382e7f9d93cf7a78bd78cbb61473b1eeb70681a9b945a9f795ec00ca2b9f9ad34941e78d5915a8c6635293a8e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5723dafacbc6881882d42de91521da44c
SHA1bd9c24b94ad019877c7929653bc0701915e43ad8
SHA256ace238a2813766fc94307ce766ef6353c584955aa9c3034af8547c2f681045bf
SHA512eb6d625d01602373268eee75835483b219a4ce0444e991c7a24ac523053b4f6ba693e56dfc0f5fd2a2ff280098d54d70b5f10c5caae56121a8e52dd82de0c831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6fd42df8cdc195f300af15c2d0c1b8d
SHA1d5514ab476057317988691f129bc785893cede1e
SHA2562896f57f2b9104be88d7c74620b887542e6978577b7a45f650c14e287f45472f
SHA512f602f4cf1a5057805f63729030f761c8ed7fd85f948bcba019dd5f050164fdaca92d2e3c145395dee47ee4c3c995d5a98cf70c90ca5de39c6a3e00d15ea454c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f3fba093b6c3dee12452a3e9e397f28
SHA1990e4c6890ec75ef391d7af05a0dada61c2503a2
SHA25646b21f3dbe953fe7c6e1e2db0d3880db10848e5fac72435ca96a0391ce959d84
SHA512f92ef5c387f07062ab5b33b9ab252363987f83e2319d752b884a20381c143b85b5809f61d08040e9669b2772f7a8471627bc6a2e63d2c0996129c209b9f3b1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5329e60891e167283dfabf3c0b0ffc8c5
SHA10e98a749635998961ffbc81e77f4ff4f6e779fe1
SHA256405e89d0e46984fc3508526430bf31677bce8fccc25d5d0c1f106d88aaa90547
SHA512016b17f424853a1d637676c4474a151b56a802b734ef3af658bd8833a4502526f044aafee6d547f6c326368933f59ae446de6fbb6b9a3e90dc3bb807f7154802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b8acde9eda509615272253a3fbad890
SHA1bc8ba2f5023a6414bcd053d6d669db50f9e5a89b
SHA25603aeb213a7123a7a8545a50d39c1aa30ea4b31099c31c2424431ceb756b2c1a8
SHA512b89d6842bf46849606e4f4cff30282c3b62a34463b8620f09a688c8b2f5c0a259fbee54ba1a959e03b6c9c091396fbc34dfc524b0a7439952251dd93b1421db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ed475adce9b456b6205a8f129c7b5fb
SHA1649a79547ff1fb19715e74e4a3281598da376691
SHA256318d16c3b7f27f5f9602e71367bef1f9ca96ee2c24ed34dd587a8f7030d2da66
SHA5122499bbc801635d374c95a0917132f544f6d923b64069783d8d76dc15fa6131e193173828d26d227d5a364cc19c42998af87123e0cbb99218f0396c30a1b31f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e98c15170cc7776d10e6f3739bc072d5
SHA167633973a021ed0a30283a6367a9d12f78beba70
SHA256dfd813c044ccf88dba2f3b53bf89802d38181cc4e6fb50b395753bfbc8f7e432
SHA512cde3f26385023d77e566e7efbdbdc94368426b241818a656b65f43ed87b62732258cea9bd39c52c2e5496d0704401a33408ea9fbc7063975b3625875c17165be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e5cc5862a18f88ff3c9881a008a65c3
SHA14f8ccd89b51fe7a9bbac845a61022117cbed612c
SHA2561568a34389a446df707d1df09f656a49b61d5e12e8094aed4622d268499ed7a5
SHA512e1c70dea41e4d5e29f37809f5a8fa2c9b1b92052052725a63035d5434f992fe9ca435b08ea449ed34f17345541c944d2e6d96c496a558d3c620cf2eefb945bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1a4c46e87030f6421662718adcbb72e
SHA1e1c097cdbe601feb4cdbb4dd3a11efe1efa87d12
SHA2564b65faf8d8656b5c5d934837a1fe9d1eb3e0865b9161f283f9404eb2f7ff5683
SHA51242d27430ccdc5e1e50d2a6ee5c3e5474edd2b1a46d4f896354a309c3a174514035aa163bdfe570d4e99025364be12f809cc0d6ccce4332f7e9626bb54dfdab91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f05bc2a033191cdb2b597964d5ee5c5
SHA14a94da21dd8ee6143627ae7954ba8d1c50bcb85c
SHA256525319291efda6db1fedd213d3a07f8f74cb79682903ad4952a9fac86ab129a9
SHA512fb20f645d3733e5f2096cea6884b673bf97c762b25c73bb81fd5870a8f43c24533ac0a7bf8a442e9b467c11bfc15264b0aca5e83054e134e3f0fcadc95bd5877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f56c50c7790e55e0ed15ac44e74f2d64
SHA125ec739012e784b46b2c250282ea71f6cdacc1a2
SHA25695f0f30d709d8c25e06c66ea13025716d0758a8a04b2cce67e58648930bfaab9
SHA512d878c4f39ccb67e5fc74161bfc3550c059de19bffcf4d40125725b6035fab3232d5ef437bbb2256f1b5343a88f80d8a82a8d0a3f00d74317c0ab7a5ddc927cfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c037dd9dd94177e45323a850c34129f6
SHA101b103db05df9991782a3255edf0b71259f56e4c
SHA256f861c1aa60d88f4cf2c7160fe9e8adfb7fa6195d351e0abd9344a83411c8d7a4
SHA5126b0065024e0db8d8af44e95931b485de0f06899609a821827c584c9d04690601ea6fb988e0f7fe3933ada84496ab828d01ec5d1c7498d1563b57495207a6d292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d29fb4385b1fe04eb7b77fda13b613b6
SHA194fba456d03b245df80dabcc7037347e13ef213a
SHA2560739e863ba251b8ea3562d4db07a58996c191d1b8a17a83df8b52692f4b66c8d
SHA51274e67a1dfce36be8be60ef65a59dfaacc47682a558bb39930ddf6d3a1a77503f43fd579e23647bd9d65b26bf0efc9b711588baf981223013b8b453785f310086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260df459fa8cde243d3a13233931a73a
SHA1c8e6ac4c6e4a718cd170d8e50be7c338c3a80c18
SHA256a9172ba31c3e4e32aee8c0e9593b3e3832d853367ec03422f611284b6b700223
SHA512ca90108964fc9c0e885540a22f64ee32a860f020bace5d4ece84b78997ceb9dd3c1a56fa583846a589f0888492e75c3b1f65337ffb8cdefcc489a58212e79de1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ea7212cf128bbb3350a7f3ed66562ed
SHA1bdbc1d6a5189d102915bcdf94f68b0c39db9eec3
SHA2561b096fc6991ab55773270235f0af6b0216b6b5fa6efc86ecf673e2155706abbf
SHA512a41f07f8fc2251006d257d9f0ed92cc7d938bf0c9b6250b525a6aea3a730ce1ebb5711db64e25e9a1f068ca7cd503e9b1d826cdddaf61c421504ccb32dd1a6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7569f1df9c1021c488d79ee8622d987
SHA1e2f031b98576f0c3a73c3a1c1e315e3e7b871cb9
SHA25674587da9a62948968771e824155962afcdfbfcc0d6f4fb0a141263299b49953b
SHA512c2da7fb6f7a2dc69e5d6141c3f171fbc0827beea8e48a060ef63a12f93daec4be72f9f3446c7db8925fe0eccafe7736021afab116fc67bb19036112f0434c6b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d51c775db65f3d3705587bf5faf7725f
SHA1bde1c515236f80b75a2d88f52b38b32d3678317a
SHA2560e567018eda8a03a7f4eec5687f13f626b16d97c2155a0ddfffd6a2fd1e21e56
SHA5129e3d49d48465bfd4a530be6ad3b4c580bba18079c589ee088cfbcc15b0a268f5fe17f28735387d96bee1d8bb67211b788fed032ff983337a287c65f7975998cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56059901e086ddcce1e2b470aba18d3a5
SHA19128a9bc4f1c1d81f0a1ff50022258e2fe3ce3ee
SHA2565a6a04576fe0e3be080548ef1760236ea773a839afd07fa12ce6e2006d899ec2
SHA51296b979387647b12f8f4296f995316a75f7191f665b9b1b19e520dcc7ae1c79420f585bd570a1405491addf7f71c1560bd863b96d9b9794f2eeb097cea00d4c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f5383abeea0d67c5807aa16c2f6746e
SHA1efaf081fdbd6d9a03997b35e010191bc5557b13f
SHA256f6ae75c16e53a944607a91118f5f64d71f21577149d592aefb5ee3057b7f99bf
SHA5128ea4445d068da85a8a3169b29ef641453624670d046ec71dc8dda0190c7b9358bee991cc5a9388b80da3de146b9a13e6812e921f6ad5bdd9cf98fc35b7b8d832
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a